The document discusses future skills related to cyber security including Internet of Things (IOT), cloud computing, big data, virtual reality, artificial intelligence, 3D printing, and robotic process automation. It then covers topics related to computer security including the need for cyber security, causes of cybercrime, and basic steps to secure personal computers and smartphones like setting passwords, installing antivirus software, and updating systems.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
19 views18 pages
IT Tools Unit-9
The document discusses future skills related to cyber security including Internet of Things (IOT), cloud computing, big data, virtual reality, artificial intelligence, 3D printing, and robotic process automation. It then covers topics related to computer security including the need for cyber security, causes of cybercrime, and basic steps to secure personal computers and smartphones like setting passwords, installing antivirus software, and updating systems.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18
Unit-9
Overview of Future skills and Cyber Security
presented by -Rakhi mathur
IOT • Internet of Things (IOT) is the networking of physical objects that contain electronics embedded within their architecture in order to communicate and sense interactions amongst each other or with respect to the external environment.
presented by -Rakhi mathur
There are four main components used in IoT: • Low-power embedded systems – Less battery consumption, high performance are the inverse factors play a significant role during the design of electronic systems. • Cloud computing – Data collected through IoT devices is massive and this data has to be stored on a reliable storage server. This is where cloud computing comes into play. • Availability of big data – We know that IoT relies heavily on sensors, especially real-time. As these electronic devices spread throughout every field. • Networking connection – In order to communicate, internet connectivity is a must where each physical object is represented by an IP address. presented by -Rakhi mathur Big Data • Big data is a field that treats ways to analyze, systematically extract information from, or otherwise deal with data sets that are too large or complex to be dealt with by traditional data-processing application software.
presented by -Rakhi mathur
Cloud Computing • Cloud computing is the on-demand availability of computer system resources, especially data storage (cloud storage) and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet.
presented by -Rakhi mathur
Virtual Reality • Virtual Reality (VR) is the use of computer technology to create a simulated environment. Unlike traditional user interfaces, VR places the user inside an experience. Instead of viewing a screen in front of them, users are immersed and able to interact with 3D worlds
presented by -Rakhi mathur
Applications of virtual reality design • Video games • Education • Car design
presented by -Rakhi mathur
Artificial Intelligence • In computer science, artificial intelligence, sometimes called machine intelligence, is intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans and animals.
presented by -Rakhi mathur
Advantage • Little/no risk. • Safe, controlled area. • Realistic scenarios. • Can be done remotely saving time and money. • Improves retention and recall. • Simplifies complex problems/situations. • Suitable for different learning styles. • Innovative and enjoyable.
presented by -Rakhi mathur
Part-2
presented by -Rakhi mathur
3D printing • 3D printing, or additive manufacturing, is the construction of a three- dimensional object from a CAD model or a digital 3D model. • 3D printing is a fundamentally different way of producing parts compared to traditional subtractive (CNC machining) or formative (Injection molding) manufacturing technologies. • In 3D printing, no special tools are required (for example, a cutting tool with certain geometry or a mold). Instead the part is manufactured directly onto the built platform layer-by-layer, which leads to a unique set of benefits and limitations.
presented by -Rakhi mathur
Robotic Process Automation • Robotic process automation is a form of business process automation technology based on metaphorical software robots or on artificial intelligence /digital workers. It is sometimes referred to as software robotics
presented by -Rakhi mathur
Computer Security • Computer security, cyber security or information technology security is the protection of computer systems and networks from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.
presented by -Rakhi mathur
Need of Cyber Security
presented by -Rakhi mathur
Causes of Cybercrime • Easy to access – The problem behind safeguarding a computer system from unauthorized access is that there are many possibilities of breach due to the complex technology. • Capacity to store data in comparatively small space – The computer has the unique characteristic of storing data in a very small space. This makes it a lot easier for the people to steal data from any other storage and use it for own profit.
presented by -Rakhi mathur
• Complex – The computers run on operating systems and these operating systems are programmed of millions of codes. The human mind is imperfect, so they can do mistakes at any stage. The cybercriminals take advantage of these gaps. • Negligence – Negligence is one of the characteristics of human conduct. So, there may be a possibility that protecting the computer system we may make any negligence which provides a cyber-criminal the access and control over the computer system. • Loss of evidence – The data related to the crime can be easily destroyed. So, Loss of evidence has become a very common & obvious problem which paralyzes the system behind the investigation of cyber-crime.
presented by -Rakhi mathur
Securing PC • 1. Keep up with system and software security updates • 2. Have your wits about you • 3. Enable a firewall • 4. Adjust your browser settings • 5. Install antivirus and anti spyware software • 6. Password protect your software and lock your device • 7. Encrypt your data • 8. Use a VPN
presented by -Rakhi mathur
Securing Smart Phone: Basic protection • Set a password • Install Find My Device • Stay updated • Set up fingerprint unlock • Prevent unknown downloads • Uninstall apps • Check app permissions